Which of the following is an example of privilege escalation?
A. A hacker accesses a printer from the Internet, then the print server, and then the domain controller
B. A hacker sends many oversized ping packets.
C. A hacker convinces a user to reveal a password.
D. A hacker follows a user into the facility.
A
Explanation: When systems are accessed by unauthorized personal a privilege escalation has occurred.
Computer Science & Information Technology
You might also like to view...
This command displays a folder in an existing folder window
A) Explore B) Restore C) Move D) Open
Computer Science & Information Technology
?Windows users who want to allow multiple people use of their computer can add a(n) ____ for each user.
A. ?index B. ?account C. ?digest D. ?customization
Computer Science & Information Technology